Blackjacking security threats to Blackberry devices, PDAs, and cell phones in the enterprise
Is someone waiting to pick off your BlackBerry?. Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Indianapolis, IN
Wiley Pub.
2007
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Table of Contents:
- Includes bibliographical references and index
- Ch. 1. Understanding the threats
- Ch. 2. Understanding the devices
- Ch. 3. Exploiting BlackBerry devices
- Ch. 4. Hacking the supporting BlackBerry infrastructure
- Ch. 5. Protecting your PC and LAN from BlackBerrys
- Ch. 6. Exploiting PDAs
- Ch. 7. Hacking the supporting PDA infrastructure
- Ch. 8. Protecting your PC and LAN from PDAs
- Ch. 9. Exploiting cell phones
- Ch. 10. Protecting the enterprise PC and LAN from cell phones